Universal Mobile Telecommunications System (UMTS)

UMTS (Universal Mobile Telecommunications System) is a so-called "third-generation (3G)," broadband , packet -based transmission of text, digitized voice, video, and multimedia at data rates up to and possibly higher than 2 megabits per second ( Mbps ), offering a consistent set of services to mobile computer and phone users no matter where they are located in the world. Based on the Global System for Mobile ( GSM ) communication standard, UMTS, endorsed by major standards bodies and manufacturers, is the planned standard for mobile users around the world by 2002. Once UMTS is fully implemented, computer and phone users can be constantly attached to the Internet as they travel and, as they roaming service , have the same set of capabilities no matter where they travel to. Users will have access through a combination of terrestrial wireless and satellite transmissions. Until UMTS is fully implemented, users can have multi-mode devices that switch to the currently available technology (such as GSM 900 and 1800) where UMTS is not yet available.

Today's cellular telephone systems are mainly circuit-switched , with connections always dependent on circuit availability. packet-switched connection, using the Internet Protocol ( IP ), means that a virtual connection is always available to any other end point in the network. It will also make it possible to provide new services, such as alternative billing methods (pay-per-bit, pay-per-session, flat rate, asymmetric bandwidth, and others). The higher bandwidth of UMTS also promises new services, such as video conferencing. UMTS promises to realize the Virtual Home Environment ( VHE ) in which a roaming user can have the same services to which the user is accustomed when at home or in the office, through a combination of transparent terrestrial and satellite connections.

Trials of UMTS technology, using advanced mobile phone/computing device prototypes, are currently being conducted by Nortel Networks and BT (British Telecommunications).

The electromagnetic radiation spectrum for UMTS has been identified as frequency bands 1885-2025 MHz for future IMT-2000 systems, and 1980-2010 MHz and 2170-2200 MHz for the satellite portion of UMTS systems.

Related Terms

Definitions

- Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE.
The SoC is the size of a shirt button but includes everything required to provide compute power for wearable devi... (WhatIs.com)

- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Private cloud (also called internal cloud) is a marketing term for an enterprise computing architecture that's protected by a firewall. Promotion of the private cloud model is designed to appeal to an organization that wants more control over their data than they can get by using a third-party hosted service such as Amazon's Elastic Compute Cloud (EC2) or Simple Storage Service (S3). (Continued)

Definition: Learn what MPLS (Multiprotocol Label Switching) is and why allowing packets to be forwarded at the Layer 2 (switching) level rather than at the Layer 3 (routing) level is important for Quality of Service (QoS).

ZigBee is a mesh network specification for low-power wireless local area networks (WLANs) that cover a large area. The standard was designed to provide high data throughput in applications where the duty cycle is low and low power consumption is an important consideration.

Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.

A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate the strength and thoroughness of compliance preparations. Auditors review security polices, user access controls and risk management procedures over the course of a compliance audit... (Continued)